Skip to main content
Litmos
  • Client Login
  • Client Support
Search
  • Products
        • Best-in-class training across the enterprise

        • Icon Image

          LMS

        • Icon Image

          Training content

        • Icon Image

          Services

        • Icon Image

          Litmos AI

  • Features
        • Icon Image

          AI Assistant

        • Icon Image

          AI/ML Video Assessments

        • Icon Image

          AI Playlists

        • Icon Image

          Content Authoring Tool

        • Icon Image

          External Training

        • Icon Image

          Instructor-Led Training (ILT/vILT)

        • Icon Image

          Integrations

        • Icon Image

          Gamified Learning

        • Icon Image

          Multilingual Learning

        • Icon Image

          Mobile Learning

        • Icon Image

          Reporting & Analytics

  • Solutions
        • Solutions by Use Case

        • Icon Image

          Compliance training

        • Icon Image

          Onboarding

        • Icon Image

          Customer Training

        • Icon Image

          Sales Training

        • Icon Image

          Employee Development

        • Icon Image

          View All Use Cases

        • Solutions by Industry

        • Icon Image

          Financial services

        • Icon Image

          Healthcare

        • Icon Image

          Manufacturing

        • Icon Image

          Technology

        • Icon Image

          Construction

        • Icon Image

          View All Industries

        • Litmos For

        • Icon Image

          Enterprise

        • Icon Image

          Mid-Market

        • Icon Image

          View All

  • Customers
        • Customer experience

        • Icon Image

          Customer stories

        • Icon Image

          Reviews

        • Icon Image

          Lenny Awards

        • For our customers

        • Icon Image

          Customer hub

        • Icon Image

          Support

  • Pricing
  • Resources
        • Learning hub

        • Icon Image

          Blog

        • Icon Image

          Resource library

        • Icon Image

          Webinars & events

        • Essential guides

        • Icon Image

          LMS 101

        • Icon Image

          eLearning blueprint

        • Icon Image

          AI learning

  • About
        • We empower learning

        • Icon Image

          About Litmos

        • Icon Image

          Newsroom

        • Icon Image

          Careers

        • Icon Image

          Awards

        • Icon Image

          Find a partner

        • Icon Image

          Become a partner

Free trial

TRAINING COURSE CATALOG

An ever-growing library of relevant training courses

Award-winning training content collections for your employees, customers, and partners across the globe. Our collections include thousands of courses professionally created for a more productive workplace.

Re-skill, upskill, or fill worker skill gaps and minimize risk with compliance training. Support retention and career mobility and best of all, create a positive culture.

Talk to an expert

Filters

Applied Filters:

Clear Filters
Keyword: AI cyber threat

Sort

Products

Use Cases

Competencies

Languages

Regions

Duration

Cybersecurity Incidents – General Awareness

In our increasingly connected world, cyber threats are on the rise and becoming ever-more sophisticated. Learn how protecting your organisation from cyber incidents.
Languages Icon English (NZ)
Duration Icon 15 Minutes

Understanding Cyber Security

Ever clicked on a link that didn’t seem totally safe? This course explains cyber security and the active role that employees play in defending workplaces from cyber threats.
Languages Icon English (UK)
Duration Icon 10 Minutes

​AI Cyber Threats – Network and Systems

AI-powered cyber threats to networks and systems are advancing at a rapid speed. This course will help you identify the impacts of these threats and find ways to prevent them from happening.   
Languages Icon English (US)
Duration Icon 10 Minutes

AI Cyber Threats – Social Engineering

AI-powered cyber threats, like social engineering attacks, are becoming harder to detect. This course will help you understand AI-powered social engineering, how to identify threats, and how to avoid falling victim to an attack to protect you and your organization.  
Languages Icon English (US)
Duration Icon 10 Minutes

Compliance Essentials – Cybersecurity

When employees know the telltale signs of cyber fraud, they’re less likely to fall victim to it. Ensure your information and systems stay secure by equipping your workforce with basic cybersecurity know-how. 
Languages Icon English (CA)
Duration Icon 15 Minutes

Assess and Learn – Cybersecurity

Understanding the who, what and why of cyberattacks can better prepare your organization against threats. Learn more with this adaptive, video-based course. 
Languages Icon English (CA)
Duration Icon 15 Minutes

Compliance Essentials – CyberSecurity

A more connected, electronic world brings huge opportunities and benefits, but it also brings risks. This course will help employees understand these cybersecurity risks, and how to recognise and deal with general technological threats.
Languages Icon English (UK)
Duration Icon 10 Minutes

Assess and Learn – Cybersecurity

A more connected, electronic world brings huge opportunities and benefits, but it also brings risks. Keep your workforce vigilant to recognising and dealing with general technological threats with regular training using this adaptive learning course.
Languages Icon English (UK)
Duration Icon 15 Minutes

Workplace Security Basics

Workplace security involves taking physical and digital security measures to protect an organizations’ greatest assets – it’s computer systems, property, and people. Being aware of the risks is key to preventing security breaches. 
Languages Icon English (US)
Duration Icon 20 Minutes

AI Awareness: Emerging AI Risks

Learn about AI-related threats such as deepfakes, AI-generated phishing emails, and automated hacking. Discover strategies to safeguard against AI-powered cyberattacks.
Languages Icon English (US)
Duration Icon 5 Minutes

Using AI Securely: Stay Safe From AI Cyber Crime

Learn how security protocols are implemented to protect AI systems from threats. Learn about the legal frameworks and guidelines that ensure the safe use of AI.
Languages Icon English (US)
Duration Icon 3 Minutes

CEH v12: Risk Management, Cyber Threat Intelligence, and Threat Modeling

At the end of the day, cybersecurity is all about understanding risk. In this course, you'll learn about how risk pertains to cybersecurity, risk levels, and how to use a risk matrix to visualize risk.
Languages Icon English (US)
Duration Icon 53 Minutes

CEH v12: Cyber Kill Chain, TTPs, Behaviors, and Threat Hunting

If you know how most threat actors and groups attack their targets, you'll be better equipped to defend against those attacks.
Languages Icon English (US)
Duration Icon 77 Minutes

CompTIA Cybersecurity Analyst+: Threat Intelligence

This 14-video course emphasizes the importance of maintaining a robust organizational security posture and equips security technicians to address both known and emerging threats.
Languages Icon English (US)
Duration Icon 48 Minutes

CompTIA Cybersecurity Analyst+: Attack Types

This 21-video course equips learners with the skills to defend organizational assets against a range of modern cyber threats.
Languages Icon English (US)
Duration Icon 111 Minutes

CEH v11: Risk Management, Cyber Threat Intelligence & Threat Modeling

At the end of the day, cybersecurity is all about understanding risk. In this course, you'll learn about how risk pertains to cybersecurity, risk levels, and how to use a risk matrix to visualize risk.
Languages Icon English (US)
Duration Icon 51 Minutes

CEH v11: Cyber Kill Chain, TTPs, Behaviors & Threat Hunting

If you know how most threat actors and groups attack their targets, you'll be better equipped to defend against those attacks.
Languages Icon English (US)
Duration Icon 65 Minutes

Cybersecurity Essentials: Identifying and Stopping Phishing Attacks

Phishing attacks are one of the most common (and successful) types of cybersecurity threats. This video will explain what they are, how to recognize them, and how to make sure you never fall victim to them.
Languages Icon English (US)
Duration Icon 6 Minutes

How Cybercriminals Continue To Successfully Sneak Into Your Inbox!

This course examines the latest and most prevalent email threats facing organizations and individuals.
Languages Icon English (US)
Duration Icon 23 Minutes

Managing Cyberthreats From Within

Today's IT and security professionals know very well they must be ready to defend against external cyberattacks targeting critical systems and data at a moment's notice. However, today there is another significant potential attack vector lingering out there that demands their equal attention. You see, a recent threat survey reported that some 74% of organizations today feel that they are vulnerable to insider attacks. In this report, Ron Temske, Vice President of Security Solutions of Logicalis, U.S., takes a close look at insider threats and offers IT, security and business professionals advice and best practices that will help minimize the risk of a successful attack.
Languages Icon English (US)
Duration Icon 26 Minutes

Cyberattacks: Trends, Threats and Prevention

The numbers have been tallied and just as expected, it was another record-breaking year for cyberattacks and breaches. In fact, the organization, Online Trust Alliance reports that "cyber incidents targeting businesses nearly doubled from 82,000 in 2016 to 159,700 in 2017, thanks to ransomware and other new attack methods. In this program expert, Josh Hester of Kaplan IT Training, explores the destructive nature of cyberattacks and discusses options to help organizations stay a step ahead of the latest attack methods.
Languages Icon English (US)
Duration Icon 26 Minutes

Insider Threats and Attacks: Detection and Prevention

Media outlets report to us regularly on the latest external cyber-attacks and security breaches. From credit card companies to financial institutions to retailers, there have been many enterprises that have fallen victim to cyber criminals and hacktivists. But recently the headlines have also been buzzing about insider-attacks. Initiated by disgruntled employees or malicious business partners, they can be very costly and difficult for the organization to recover from. In this report Jason Mical, Director of Network Forensics at Access Data, offers advice and best practices to help organizations reduce the risk of a successful insider attack on enterprise data, systems and networks.
Languages Icon English (US)
Duration Icon 21 Minutes

Start Your Free Trial Today

Start your 14-day free trial with absolutely zero risk or obligation to purchase. Test drive our Premier LMS and see for yourself how our learning solution can improve your learning program outcomes! We have flexible purchase options, including an option to buy directly through the trial!

Free Trial
Litmos Free Trial

Request more information

To learn how Litmos can meet your needs, fill out the form below.

Content Request Courses

"*" indicates required fields

Consent*
Litmos US, L.P. will use any of the data provided hereunder in accordance with the Privacy Policy.
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is for validation purposes and should be left unchanged.
Litmos
Contact sales
Solutions by Use Case
  • Company
  • Newsroom
  • Awards
  • Customers
  • Careers
  • Customer portal
  • Partner portal
Products
  • Products
  • LMS
  • Courses
  • Services
  • AI solutions
  • Mid-Market
  • Enterprise
Features
  • Features
  • Content authoring tool
  • AI assistant
  • AI Video assessments
  • External training
  • Gamification
  • Multilingual learning
Solutions
  • Solutions
  • Employee development
  • Customer training
  • Sales enablement
  • Compliance training
  • Onboarding training
Resources
  • Resources
  • Blog
  • LMS 101
  • eLearning
  • AI learning
  • Webinars
© 2025 Litmos US, L.P. and affiliates. All rights reserved.
  • Privacy Statement
  • Terms & Conditions
  • AI Principles
  • Website Terms
  • Modern Slavery Statement
  • Accessibility Statement
x-logo x-logo Linkedin-logo Facebook Instagram
Register for early access to Litmos Features

Release Notes feedback

"*" indicates required fields

Please provide your email and indicate which domain(s) you'd like the new features enabled.